PoC malware built by copy-paste
☆25Apr 10, 2021Updated 4 years ago
Alternatives and similar repositories for LazyS
Users that are interested in LazyS are comparing it to the libraries listed below
Sorting:
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- WinHTTP Async demo☆13Jan 13, 2023Updated 3 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Feb 10, 2017Updated 9 years ago
- ☆15Aug 23, 2020Updated 5 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Using macros in order to encrypt strings during compilation time.☆15Mar 28, 2019Updated 6 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 10 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17May 16, 2018Updated 7 years ago
- A Python program that scans RAM.☆40Jan 10, 2015Updated 11 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Jan 6, 2023Updated 3 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Disassembling binaries to neat asm sources.☆20Feb 5, 2018Updated 8 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated last year
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆66Feb 11, 2018Updated 8 years ago
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- The open-source DAM for modern organizations☆13Feb 25, 2026Updated last week
- ProgramCMS is a complete, trustworthy CMS & easy to use PHP Framework to build and deploy All kind of Web Sites. Please note that Program…☆18Apr 30, 2025Updated 10 months ago
- PowerShell Reverse HTTPs Shell☆30Nov 14, 2014Updated 11 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58May 21, 2025Updated 9 months ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Nov 5, 2022Updated 3 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- All the Power with no Shell☆33Dec 13, 2021Updated 4 years ago